Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Oxide
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Oxide
ID: USN-3041-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS
Datum: Fr, 5. August 2016, 20:38
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============7008580398414409209==
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="a8mmCwQei00vDr6pCw4j1FEKgJ0U3hs1q"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--a8mmCwQei00vDr6pCw4j1FEKgJ0U3hs1q
Content-Type: multipart/mixed;
boundary="xk1fUaVCs3BGBI6x3im0Qw2asBPoaPGi4"
From: Chris Coulson <chris.coulson@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <f27b24d7-32a4-0757-7eec-c6a0889782aa@canonical.com>
Subject: [USN-3041-1] Oxide vulnerabilities

--xk1fUaVCs3BGBI6x3im0Qw2asBPoaPGi4
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3041-1
August 05, 2016

oxide-qt vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Oxide.

Software Description:
- oxide-qt: Web browser engine for Qt (QML plugin)

Details:

Multiple security issues were discovered in Chromium. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to read uninitialized memory, cause a denial
of service (application crash) or execute arbitrary code. (CVE-2016-1705)

It was discovered that the PPAPI implementation does not validate the
origin of IPC messages to the plugin broker process. A remote attacker
could potentially exploit this to bypass sandbox protection mechanisms.
(CVE-2016-1706)

It was discovered that Blink does not prevent window creation by a
deferred frame. A remote attacker could potentially exploit this to bypass
same origin restrictions. (CVE-2016-1710)

It was discovered that Blink does not disable frame navigation during a
detach operation on a DocumentLoader object. A remote attacker could
potentially exploit this to bypass same origin restrictions.
(CVE-2016-1711)

A use-after-free was discovered in Blink. If a user were tricked in to
opening a specially crafted website, an attacker could potentially exploit
this to cause a denial of service via renderer process crash, or execute
arbitrary code. (CVE-2016-5127)

It was discovered that objects.cc in V8 does not prevent API interceptors
from modifying a store target without setting a property. A remote
attacker could potentially exploit this to bypass same origin
restrictions. (CVE-2016-5128)

A memory corruption was discovered in V8. If a user were tricked in to
opening a specially crafted website, an attacker could potentially exploit
this to cause a denial of service via renderer process crash, or execute
arbitrary code. (CVE-2016-5129)

A security issue was discovered in Chromium. A remote attacker could
potentially exploit this to spoof the currently displayed URL.
(CVE-2016-5130)

A use-after-free was discovered in libxml. If a user were tricked in to
opening a specially crafted website, an attacker could potentially exploit
this to cause a denial of service via renderer process crash, or execute
arbitrary code. (CVE-2016-5131)

The Service Workers implementation in Chromium does not properly implement
the Secure Contexts specification during decisions about whether to
control a subframe. A remote attacker could potentially exploit this to
bypass same origin restrictions. (CVE-2016-5132)

It was discovered that Chromium mishandles origin information during proxy
authentication. A man-in-the-middle attacker could potentially exploit this
to spoof a proxy authentication login prompt. (CVE-2016-5133)

It was discovered that the Proxy Auto-Config (PAC) feature in Chromium
does not ensure that URL information is restricted to a scheme, host and
port. A remote attacker could potentially exploit this to obtain sensitive
information. (CVE-2016-5134)

It was discovered that Blink does not consider referrer-policy information
inside an HTML document during a preload request. A remote attacker could
potentially exploit this to bypass Content Security Policy (CSP)
protections. (CVE-2016-5135)

It was discovered that the Content Security Policy (CSP) implementation in
Blink does not apply http :80 policies to https :443 URLs. A remote
attacker could potentially exploit this to determine whether a specific
HSTS web site has been visited by reading a CSP report. (CVE-2016-5137)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
liboxideqtcore0 1.16.5-0ubuntu0.16.04.1

Ubuntu 14.04 LTS:
liboxideqtcore0 1.16.5-0ubuntu0.14.04.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-3041-1
CVE-2016-1705, CVE-2016-1706, CVE-2016-1710, CVE-2016-1711,
CVE-2016-5127, CVE-2016-5128, CVE-2016-5129, CVE-2016-5130,
CVE-2016-5131, CVE-2016-5132, CVE-2016-5133, CVE-2016-5134,
CVE-2016-5135, CVE-2016-5137

Package Information:
https://launchpad.net/ubuntu/+source/oxide-qt/1.16.5-0ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/oxide-qt/1.16.5-0ubuntu0.14.04.1



--xk1fUaVCs3BGBI6x3im0Qw2asBPoaPGi4--

--a8mmCwQei00vDr6pCw4j1FEKgJ0U3hs1q
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJXpJdQAAoJEGEfvezVlG4PqnYH/i0Np/4cF8TcZ8nQ9l1NHCRl
O/r1W+QrC9uosGYMPkeFZPQTGWzLCjboZWZrh3MCd6ShRk8hsF9HOCmNKszzZbDs
QdJ9TvfNImDCXLWRpDzqIkehAWeGlMRdEm8cIN1GS75zQOSS8CZcwfTRCWqEAkRN
+aqmCO+gI4Itww9xOfXtdVw0+KZy7bbnuv/gD4Ls26LciUMl07QhfZx68dKgMRKS
SQHcHqBDJA/2lmJpvhO7ZqQKdJSdTCNYTEYyJynFP4u91CkCGnfcqnqC+n051OVr
G6iqscu05aHPYryvJAmY70MgiZLWiG5xlxlPW4xBX7wogJ12obagwPVWyEUOpg4=
=VoTk
-----END PGP SIGNATURE-----

--a8mmCwQei00vDr6pCw4j1FEKgJ0U3hs1q--


--===============7008580398414409209==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============7008580398414409209==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung